A Unified Framework for Cloud Computing using AES and k-NN Classifier
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.1-5, May-2016
Abstract
Data Mining is a way to distillate knowledge from large data sets. Classification consists of predicting a certain outcome based on the given input. Cloud provides the customers to store large amount of data. When classification is done on such large data sets we will know the true potential. But the problem with cloud is that the data is outsourced and anybody can access the data. This has made majority of companies not use the services of cloud. These companies need to give security to customer’s data. One of the ways to provide security to data is by using encryption. But classification cannot be done on encrypted data. This paper addresses the Data Mining over Encrypted Data (DMED) problem. We use the AES and the k-NN classifier to propose a unified framework to provide confidentiality of data.
Key-Words / Index Term
AES, k-NN classifier, Data Mining over Encrupted Data
References
[1] C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proc. 41st Annu. ACM Sympos. Theory Comput., 2009, pp. 169–178.
[2] C. Gentry and S. Halevi, “Implementing gentry’s fully-homomorphic encryption scheme,” in Proc. 30th Annu. Int. Conf. Theory Appl. Cryptographic Techn.: Adv. Cryptol., 2011, pp. 129–148.
[3] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, pp. 612–613, 1979.
[4] R. Agrawal and R. Srikant, “Privacy-preserving data mining,” ACM Sigmod Rec., vol. 29, pp. 439–450, 2000.
[5] Y. Lindell and B. Pinkas, “Privacy preserving data mining,” in Proc. 20th Annu. Int. Cryptol. Conf. Adv. Cryptol., 2000, pp. 36–54.
[6] P. Zhang, Y. Tong, S. Tang, and D. Yang, “Privacy preserving Naive Bayes classification,” in Proc. 1st Int. Conf. Adv. Data Mining Appl., 2005, pp. 744–752.
[7] L. Xiong, S. Chitti, and L. Liu, “K nearest neighbor classification across multiple private databases,” in Proc. 15th ACM Int. Conf. Inform. Knowl. Manage., 2006, pp. 840–841.
[8] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order preserving encryption for numeric data,” in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2004, pp. 563–574.
[9] X. Xiao, F. Li, and B. Yao, “Secure nearest neighbor revisited,” in Proc. IEEE Int. Conf. Data Eng., 2013, pp. 733–744.
[10] Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Classification of Efficient Symmetric Key Cryptography Algorithms”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol. 14, No. 2, pp (105-110), Feb 2016 .ISSN: 1947-5500
[11] Shivlal Mewada, Pradeep Sharma, S.S Gautam, “Exploration of Efficient Symmetric AES Algorithm”, Ist IEEE Symposium on Colossal Data Analysis and Networking (CDAN-2016)”, Mar 18th -19th, 2016. ISBN: 978-1-5090-0669-4
[12] B. K. Samanthula, Y. Elmehdwi, and W. Jiang, “k-nearest neighbor classification over semantically secure encrypted relational data,” eprint arXiv:1403.5001, 2014.
Citation
VARUN K H and GIRISHA G S, "A Unified Framework for Cloud Computing using AES and k-NN Classifier", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.1-5, 2016.
Vitality Efficient Fault-Tolerant Data Storage and Dispensation Via K-Out-N Technique in Versatile Cloud
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.6-12, May-2016
Abstract
In spite of the advances in equipment for hand handle gadgets, asset concentrated applications (e.g. video and picture stockpiling and preparing or outline sort) still stay off limits since they require substantial calculation and capacity abilities. Late research has endeavored to address these issues by utilizing remote servers, for example, mists and associate cell phones, for cell phones sent in element systems (i.e., with regular topology changes as a result of hub disappointment or inaccessibility and portability as in a versatile cloud), in any case ,difficulties of unwavering quality and vitality proficiency stay to a great extent unaddressed.to the best of our insight ,we are the first to address these difficulties in a coordinated way for both information stockpiling and handling in versatile cloud. A methodology we get k-out-of-n registering in our answer ,cell phones effectively recover or process information, in the most vitality – proficient route, the length of k out of remote servers are open.
Key-Words / Index Term
Mobile computing, cloud computing, mobile cloud, energy efficient computing, fault-tolerant.
References
[1] M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, “The case for VM-based cloudlets in mobile computing,” IEEE Pervasive Computer., vol. 8, no. 4, pp. 14–23, Oct.-Dec. 2009.
[2] B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, “CloneCloud: Elastic execution between mobile device and cloud,” in Proc. 6th Conf. Computer. Syst., 2011, pp. 301–314.
[3] S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang, “ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading,” in Proc. IEEE Conf. Computer. Communication. 2012, pp. 945–953.
[4] C. Shi, V. Lakafosis, M. H. Ammar, and E. W. Zegura, “Serendipity: Enabling remote computing among intermittently connected mobile devices,” in Proc. 13th ACM Int. Symp. Mobile Ad Hoc Network. Computation. 2012, pp. 145–154.
[5] S. M. George, W. Zhou, H. Chenji, M. Won, Y. Lee, A. Pazarloglou, R. Stoleru, and P. Barooah, “DistressNet: A wireless Ad Hoc and sensor network architecture for situation management in disaster response,” IEEE Communication. Mag., vol. 48, no. 3, pp. 128–136, Mar. 2010.
[6] International Journal of Computer Applications (0975 – 8887)Volume 121 – No.19, July 2015
[7] A. Beloglazov, J. Abawajy, and R. Buyya, “Energy-aware resource allocation heuristics for efficient management of data centres for cloud computing,” Future Generation Computer. Syst., vol. 28, no. 5, pp. 755–768, 2012.
[8] C. Chen, M. Won, R. Stoleru, and G. Xie, “Resource allocation for energy efficient k-out-of-n system in mobile ad hoc networks,” in Proc. 22nd Int. Conf. Computer Communication Network., 2013, pp. 1–9.
[9] Energy –efficient fault tolerant data storage and processing in mobile cloud 2015
Citation
Pushpa S, Sowmya Naik P.T, "Vitality Efficient Fault-Tolerant Data Storage and Dispensation Via K-Out-N Technique in Versatile Cloud", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.6-12, 2016.
Profit Maximization for Cloud Services in Multiserver Environment
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.13-17, May-2016
Abstract
Cloud computing provides resources and services to customers in a dynamic basis. That’s why it has become an effective and very efficient way for computing. Profit plays a very important role from perspective of a cloud service provider. This profit will be determined based on how a cloud service platform has been configured and it also depends on market demand. Generally a single long term renting will be used to configure a cloud platform which is not capable of quality service and it also leads to a greater resource waste.
Key-Words / Index Term
Cloud computing, guaranteed service quality, multiserver system, profit maximization, queuing model, service-level agreement, waiting time.
References
[1] K. Hwang, J. Dongarra, and G. C. Fox, Distributed and Cloud Computing. Elsevier/Morgan Kaufmann, 2012.
[2] J. Cao, K. Hwang, K. Li, and A. Y. Zomaya, “Optimal multiserver configuration for profit maximization in cloud computing,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1087–1096, 2013.
[3] A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, “Above the clouds: A berkeley view of cloud computing,” Dept. Electrical Eng. and Comput. Sciences, vol. 28, 2009.
[4] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging it platforms:
Vision, hype, and reality for delivering computing as the 5th utility,” Future Gener. Comp. Sy., vol. 25, no. 6, pp. 599– 616, 2009.
[5] P. Mell and T. Grance, “The NIST definition of cloud computing. national institute of standards and technology,” Information Technology Laboratory, vol. 15, p. 2009, 2009.
[6] J. Chen, C. Wang, B. B. Zhou, L. Sun, Y. C. Lee, and A. Y. Zomaya, “Tradeoffs between profit and customer satisfaction for service provisioning in the cloud,” in Proc. 20th Int’l Symp. High Performance Distributed Computing. ACM, 2011, pp. 229–238.
[7] C T Lin “Comparative based analysis of scheduling algorithm of resource management in cloud computing environment” vol 1, issue 1, July 2013, IJCSE issue.
Citation
Raushan kashypa and Sowmya Naik P.T , "Profit Maximization for Cloud Services in Multiserver Environment", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.13-17, 2016.
Adjudicator: A Pluggable Multiclass Job Scheduler
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.18-23, May-2016
Abstract
The responsibility of contemporary multi-core processors is oftentimes bent on by a given power ration that requisite developer to evaluate different resolution trade-offs, e.g., to espouse between many slow, power-efficient cores, or fewer faster, power-hungry cores, or a amalgamation of them . Here, a prototype, a new Hadoop scheduler, called adjudicator, that utilizes aptness proffered by heterogeneous cores within a single multi-core processor for accomplishing a variety of performance objectives. Heterogeneous multi-core processors enable creating virtual resource pools based on “slow” and “fast” cores for multi-class priority scheduling. Since the same data can be accessed with either “slow” or “fast” apertures, spare resources (apertures) can be shared between different resource pools. Using sample experimental data and via simulation, a wrangle is made in approbation of heterogeneous multi-core processors as they achieve “faster” processing of small, interactive MapReduce jobs, while proffering improved throughput for large, batch jobs. Evaluation is done on performance benefits of adjudicator versus the FIFO and Capacity job schedulers that are broadly used in the Hadoop community.
Key-Words / Index Term
Hadoop, MapReduce, Adjudicator, Job scheduler, Computing, Heterogeneous
References
[1] M. Bertalmio, G. Sapiro, V. Caselles, C. Ballester, “Image inpainting,” SIGGRAPH, pp. 417–424, 2010.
[2] J. Hays, A. A. Efros, “Scene completion using millions of photographs,” ACM Trans. on Graphics, vol. 126, 2009.
[3] O. Whyte, J. Sivic A. Zisserman, “Get out of my picture! Internet-based inpainting,” British Machine Vision Conference, 2012.
[4] S. Edelman, N. Intrator, T. Poggio. Complex cells and object recognition.[Online].Available:http://kybele.psych.cornell.edu/_edelman/ Archive/nips97.pdf
[5] M. A. Fischler, and R. C. Bolles, “Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography,” Comm. of the ACM, vol. 24, pp. 381–395, 2011.
[6] J. Philbin, O. Chum, M. Isard, J. Sivic and A. Zisserman, “Object retrieval with large vocabularies and fast spatial matching,” IEEE Conf. on CVPR, pp. 1–8, 2013.
[7] G. J. Sullivan, J. R. Ohm, “Recent developments in standardization of high efficiency video coding (HEVC),” SPIE Applications of Digital Image Processing XXXIII, vol. 7798, 2010.
[8] R. Kumar, D. M. Tullsen, P. Ranganathan, N. P. Jouppi, and K. I. Farkas, “Single-isa heterogeneous multi-core architectures for multithreaded workload performance,” in ACM SIGARCH Computer Architecture News, vol. 32, no. 2, 2014.
[9] M. Zaharia et al., “Improving mapreduce performance in heterogeneous environments,” in Proceedings of OSDI, 2008.
[10] W. Jiang and G. Agrawal, “Mate-cg: A map reduce-like framework for accelerating data-intensive computations on heterogeneous clusters,” in Parallel Distributed Processing Symposium (IPDPS), 2012 IEEE 26th International, May 2012, pp. 644–655.
[11] Saleem Malik “ Proliferation, Deportment and Revelation of cloak worms- a comparative study”. Lambert academic publishers, ISBN- 978-3-659-74991-9.
Citation
Nishmitha K.S, Megahana K, Monica N, Anima P, Saleem Malik, "Adjudicator: A Pluggable Multiclass Job Scheduler", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.18-23, 2016.
Participatory Sensing Systems in Privacy and Quality Preserving Multimedia Data Aggregation
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.24-29, May-2016
Abstract
with the prevalence of portable remote gadgets outfitted with different sorts of detecting capacities, another administration worldview named participatory detecting has developed to furnish clients with shiny new background. Be that as it may, the wide use of participatory detecting has its own particular difficulties, among which protection and sight and sound information quality conservations are two basic issues. Shockingly, none of the current work has completely tackled the issue of protection and quality safeguarding participatory detecting with interactive media information. In this paper, we propose SLICER, which is the primary k-unknown protection safeguarding plan for participatory detecting with mixed media information. SLICER coordinates an information coding strategy and message exchange techniques, to accomplish solid insurance of members' protection, while keeping up high information quality. In particular, we consider two sorts of information exchange systems, specifically exchange on get together (TMU) and negligible cost exchange (MCT). For MCT, we propose two diverse however complimentary calculations, including an estimate calculation and a heuristic calculation, subject to various qualities of the necessity. Moreover, we have actualized SLICER and assessed its execution utilizing freely discharged taxi follows. Our assessment results demonstrate that SLICER accomplishes high information quality, with low calculation and correspondence overhead.
Key-Words / Index Term
Participatory sensing, privacy preservation, K-anonymity, erasure coding
References
[1] J. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, and M. B. Srivastava, “Participatory sensing,” presented at the First Workshop World-Sensor-Web 4th ACM Conf. Embedded Netw. Sen. Syst., Boulder, CO, USA, Oct. 2006.
[2] “The world in 2013: ICT Facts and Figures,” International Telecommunication Union. [Online]. Available: http://www.itu.int, 2013.
[3] R. K. Ganti, N. Pham, H. Ahmadi, S. Nangia, and T. F. Abdelzaher, “GreenGPS: A participatory sensing fuel-efficient maps application,” presented at the 8th Int. Conf. Mobile Syst., Appl. Serv., San Francisco, CA, USA, Jun. 2010.
[4] M. Mun, S. Reddy, K. Shilton, N. Yau, J. Burke, D. Estrin, M. Hansen, E. Howard, R. West, and P. Boda, “PEIR: The personal environmental impact report, as a platform for participatory sensing systems research,” presented at the 7th Int. Conf. Mobile Syst., Appl., Serv., Krakow, Poland, Jun. 2009.
[5] E. D. Cristofaro and C. Soriente, “Pepsi: Privacy enhancing participatory sensing infrastructure,” presented at the 4th ACM Conf. Wireless Netw. Secur., Hamburg, Germany, Jun. 2011.
Citation
Aravinda T V , Naghabhushana , Mamatha O , "Participatory Sensing Systems in Privacy and Quality Preserving Multimedia Data Aggregation", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.24-29, 2016.
Efficient Deep Learning for Big Data: A Review
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.30-35, May-2016
Abstract
The data science is composed of Big Data Analytics (BDA) and Deep Learning (DL). Apart from this Big Data (BD) has got popularity due to its importance in the present genre for both the public and private organizations, as this applies to collection of huge data. Basically, the BD is composed of many national intelligence applications, medical technology, cyber security data, etc. Many of the companies are analyzing the BD for its business purpose. The DL is the sequential or active learning process which collects the complex data and high-level data. This DL has its own beneficial key functions like learning and analysis of the enormous volume of unsupervised data (UD). This performs as the most valuable data analytics tool for BDA. In this paper, a brief overview of Deep learning in Big Data Analytics is presented with the challenges of DL in BD. The statistical survey is formulated by using IEEExplore. Finally, the paper future study requirements in Deep learning are discussed.
Key-Words / Index Term
Big Data, Big Data Analytics, Deep Learning, Machine Learning, Unsupervised Data
References
[1] Sato, Aki-Hiro. Applied Data-Centric Social Sciences. Springer, 2014.
[2] Ballard, Chuck, et al. Information Governance Principles and Practices for a Big Data Landscape. IBM Redbooks, 2014.
[3] Han, Jiawei, Micheline Kamber, and Jian Pei. Data mining: concepts and techniques. Elsevier, 2011.
[4] Hand, David J., Heikki Mannila, and Padhraic Smyth. Principles of data mining. MIT Press, 2001.
[5] Liu, Huan, and Hiroshi Motoda. Feature selection for knowledge discovery and data mining. Vol. 454. Springer Science & Business Media, 2012.
[6] Olson, David L., and Dursun Delen. Advanced data mining techniques. Springer Science & Business Media, 2008.
[7] De Castro, Leandro Nunes. Fundamentals of natural computing: basic concepts, algorithms, and applications. CRC Press, 2006.
[8] Bengio, Yoshua. "Learning deep architectures for AI." Foundations and Trends in Machine Learning 2.1, pp.1-127, 2009.
[9] Glorot, Xavier, Antoine Bordes, and Yoshua Bengio. "Domain adaptation for large-scale sentiment classification: A deep learning approach." Proceedings of the 28th International Conference on Machine Learning (ICML-11). 2011.
[10] Ngiam, Jiquan, et al. "On Optimization methods for deep learning." Proceedings of the 28th International Conference on Machine Learning (ICML-11). 2011.
[11] Snoek, Jasper, Hugo Larochelle, and Ryan P. Adams. "Practical bayesian optimization of machine learning algorithms." Advances in neural information processing systems. 2012.
[12] MacKay, David JC. Information theory, inference and learning algorithms. Cambridge university press, 2003.
[13] Lee, Honglak, et al. "Convolutional deep belief networks for scalable unsupervised learning of hierarchical representations." Proceedings of the 26th Annual International Conference on Machine Learning. ACM, 2009.
[14] Chen, Xue-Wen, and Xiaotong Lin. "Big data deep learning: challenges and perspectives." Access, IEEE 2, pp. 514-525, 2014.
[15] Najafabadi, Maryam M., et al. "Deep learning applications and challenges in big data analytics." Journal of Big Data 2.1, pp. 1-21, 2015.
[16] Goldberg, David E., and John H. Holland. "Genetic algorithms and machine learning." Machine learning 3.2, pp. 95-99, 1988.
[17] Andrieu, Christophe, et al. "An introduction to MCMC for machine learning." Machine learning 50.1-2, 5-43, 2003.
[18] Kubat, Miroslav, Robert C. Holte, and Stan Matwin. "Machine learning for the detection of oil spills in satellite radar images." Machine learning 30.2-3, pp. 195-215, 1998.
[19] Rasmussen, Carl Edward. "Gaussian processes for machine learning." 2006.
[20] Freitag, Dayne. "Machine learning for information extraction in informal domains." Machine learning 39.2-3, pp. 169-202, 2000.
[21] Sebastiani, Fabrizio. "Machine learning in automated text categorization." ACM computing surveys (CSUR) 34.1, pp. 1-47, 2002.
[22] Michie, Donald, David J. Spiegelhalter, and Charles C. Taylor. "Machine learning, neural and statistical classification." 1994.
[23] Carbonell, Jaime G., Ryszard S. Michalski, and Tom M. Mitchell. "An overview of machine learning." Machine learning. Springer Berlin Heidelberg, pp. 3-23, 1983.
[24] Aha, David W., Dennis Kibler, and Marc K. Albert. "Instance-based learning algorithms." Machine Learning 6.1, pp. 37-66, 1991.
[25] Wang, Sun-Chong. "Artificial neural network." Interdisciplinary Computing in Java Programming. Springer US, pp. 81-100, 2003.
[26] Hagan, Martin T., et al. Neural network design. Vol. 20. Boston: PWS publishing company, 1996.
[27] Hsu, Kuo‐lin, Hoshin Vijai Gupta, and Soroosh Sorooshian. "Artificial neural network modeling of the rainfall‐runoff process." Water resources research 31.10, pp.2517-2530, 1995.
[28] Srinivasa, Srinath, and V. Bhatnagar. "Big data analytics." Proceedings of the First International Conference on Big Data Analytics BDA. 2012.
[29] Miller, Steven. "Big Data Analytics." (2013).
[30] Chen, Hsinchun, Roger HL Chiang, and Veda C. Storey. "Business Intelligence and Analytics: From Big Data to Big Impact." MIS quarterly 36.4, pp.1165-1188, 2012.
[31] Govindaraju, Venu, Vijay Raghavan, and C. R. Rao. Big Data Analytics. Vol. 33. Elsevier, 2015.
[32] Zakir, Jasmine, Tom Seymour, and Kristi Berg. "BIG DATA ANALYTICS." Issues in Information Systems 16.2 (2015).
[33] Suthaharan, Shan. "Big Data Analytics." Machine Learning Models and Algorithms for Big Data Classification. Springer US, pp. 31-75, 2016.
[34] Zikopoulos, Paul, and Chris Eaton. Understanding big data: Analytics for enterprise class Hadoop and streaming data. McGraw-Hill Osborne Media, 2011.
[35] LaValle, Steve, et al. "Big data, analytics and the path from insights to value." MIT Sloan management review 52.2,pp.21,2011.
[36] Weigel, Van B. Deep Learning for a Digital Age: Technology's Untapped Potential To Enrich Higher Education. Jossey-Bass, 989 Market Street, San Francisco, CA 94103-1741, 2002.
[37] Arel, Itamar, Derek C. Rose, and Thomas P. Karnowski. "Deep machine learning-a new frontier in artificial intelligence research [research frontier]." Computational Intelligence Magazine, IEEE 5.4, pp.13-18, 2010.
[38] Weston, Jason, et al. "Deep learning via semi-supervised embedding." Neural Networks: Tricks of the Trade. Springer Berlin Heidelberg, pp. 639-655, 2012. .
[39] LeCun, Yann, Yoshua Bengio, and Geoffrey Hinton. "Deep learning." Nature 521.7553, pp. 436-444, 2015.
[40] Najafabadi, Maryam M., et al. "Deep learning applications and challenges in big data analytics." Journal of Big Data 2.1, pp. 1-21, 2015.
[41] Chen, CL Philip, and Chun-Yang Zhang. "Data-intensive applications, challenges, techniques, and technologies: A survey of Big Data." Information Sciences 275, pp. 314-347, 2014.
[42] Kunlei Zhang; Xue-Wen Chen, "Large-Scale Deep Belief Nets With
[43] MapReduce," in Access, IEEE, vol.2, no., pp.395-403, 2014.
[44] Xue-Wen Chen; Xiaodong Lin, "Big Data Deep Learning: Challenges and Perspectives," in Access, IEEE, vol.2, no., pp.514-525, 2014
[45] Fei Wu; Zhuhao Wang; Zhongfei Zhang; Yi Yang; Jiebo Luo; Wenwu Zhu; Yueting Zhuang, "Weakly Semi-Supervised Deep Learning for Multi-Label Image Annotation," in Big Data, IEEE Transactions on, vol.1, no.3, pp.109-122, Sept. 1, 2015
[46] Weishan Zhang; Pengcheng Duan; Zhongwei Li; Qinghua Lu; Wenjuan Gong; Su Yang, "A Deep Awareness Framework for Pervasive Video Cloud," inAccess, IEEE, vol.3, no., pp.2227-2237, 2015.
[47] Hongming Zhou; Guang-Bin Huang; Zhiping Lin; Han Wang; Yeng Chai Soh, "Stacked Extreme Learning Machines," in Cybernetics, IEEE Transactions on, vol.45, no.9, pp.2013-2025, Sept. 2015
[48] Yisheng Lv; Yanjie Duan; Wenwen Kang; Zhengxi Li; Fei-Yue Wang, "Traffic Flow Prediction With Big Data: A Deep Learning Approach," in Intelligent Transportation Systems, IEEE Transactions on, vol.16, no.2, pp.865-873, April 2015
[49] Park, S.-W.; Park, J.; Bong, K.; Shin, D.; Lee, J.; Choi, S.; Yoo, H.-J., "An Energy-Efficient and Scalable Deep Learning/Inference Processor With Tetra-Parallel MIMD Architecture for Big Data Applications," in Biomedical Circuits and Systems, IEEE Transactions on , vol.9, no.6, pp.838-848, Dec. 2015
[50] Jun Wang; Wei Liu; Kumar, S.; Shih-Fu Chang, "Learning to Hash for Indexing Big Data—A Survey," in Proceedings of the IEEE, vol.104, no.1, pp.34-57, Jan. 2016
[51] Zhang, Q.; Yang, L.T.; Chen, Z., "Deep Computation Model for Unsupervised Feature Learning on Big Data," in Services Computing, IEEE Transactions on, vol.9, no.1, pp.161-171, Jan.-Feb. 1 2016
[52] Leung, M.K.K.; Delong, A.; Alipanahi, B.; Frey, B.J., "Machine Learning in Genomic Medicine: A Review of Computational Problems and Data Sets," inProceedings of the IEEE, vol.104, no.1, pp.176-197, Jan. 2016
Citation
Leelavathi MV, Sahana Devi K J, "Efficient Deep Learning for Big Data: A Review", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.30-35, 2016.
Survey of Automated Recommender System for Web Applications
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.36-39, May-2016
Abstract
Online shopping new way of business in present days based on the previous surfing and purchasing products are recommended to the users. The existing method of recommending the product has to undergo several processes or functionalities and these processes or functionalities are manually tested for the accuracy. The manual testing method requires lot of time and money and other resources. To overcome the problem this paper proposes a Automation Testing for the recommender system, with Feature Vector Algorithm and perform a automation on each modules of the Feature Vector algorithm and also checks the Cross-Browser compatibility across the browser and also collecting the online reviews from by using Web Crawling Technique.
Key-Words / Index Term
Feature Vector, Recommender System, Cross-Browser Compatibility, Web Crawling Technique
References
[1] Greg Linden, Brent Smith, and Jeremy York Amazon.com Recommendations Item-to-Item Collaborative Filtering • Amazon.com JANUARY • FEBRUARY 2003 Published by the IEEE Computer Society.
[2] Emmanouil Vozalis, Konstantinos G. Margaritis, Analysis of Recommender Systems’ Algorithms, 2001.
[3] A. Mesban and A van Deursen, “ Invariant –based automatic testing of AJAX user interface.” In ICSF’09: proceedings of the 2009 IEEE,31st International Conference on software Engineering. Washinton. DC, USA: IEEE Computer Society.2009,pp. 221-220.
[4] M. Schur, A. Roth, and A. Zeller, “Mining behavior models from enterprise web applications,” Sep. 2013, pp. 442–432.
[5] V. Dallmeier, M. Burger, T. Orth, and A. Zeller, “Webmate: Generating test cases for web 2.0,” in Software Quality. Increasing Value in Software and Systems Development. Springer, Jan. 2013, pp. 55–69.
[6] S. R. Choudhary, M. R. Prasad, and A. Orso, “X-pert: accurate identification of cross-browser issues in web applications,” in ICSE, 2013, pp. 702–711. [6] BMWI, “Exist,” www.exist.de.
[7] A. Kumar,” Collaborative Web Recommendation Systems Based on an Effective Fuzzy Association Rule Mining Algorithm (FARM)” Indian Journal of Computer Science and Engineering Vol 1 No 3 184-191.
Citation
Vinutha K.N, K.S. Sampada, "Survey of Automated Recommender System for Web Applications", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.36-39, 2016.
Agile Software Development
Review Paper | Journal Paper
Vol.04 , Issue.03 , pp.40-45, May-2016
Abstract
Successful software is one which provides quality product in given cost and time. Delivering quality software in definite time is a difficult task. Traditional software processes are heavy weight, giving importance to documentation and are rigid making them difficult to apply to different software projects. Agile has become one of the big buzzwords in the software development industry. To put it simply, Agile development or lightweight methods are less documentation oriented and more code oriented stating that source code is the most important document. Agile is a different way of executing software development teams and projects. Agile approaches help the teams respond to unpredictability through incremental, iterative work cadences or otherwise known as “sprints”. Agile methodologies are an alternative to waterfall, or traditional sequential development. This software can be used in development stage, open collaboration and process adaptability in the process of project development. With a minimal work in different stages can improve planning of the project. . This paper discusses a few agile processes, the philosophy driving them and challenges faced while implementing them and mainly focuses on seeking alternative approach to traditional project management.
Key-Words / Index Term
Agile movement, software methodology, iterative tasks, light-weight methods
References
[1] Manifesto for Agile software development; http://agilealliance.com
[2] New methodology; Fowler; Martin;
http://www.martinfowler.com/articles/newMethodology.html
[3] Agile Software Development Processes- A Different approach to Software design; Keith, Everette R; http://www.agilealliance.com/articles/articles/ADifferentApproach.pdf
[4] www.extremeprogramming.org; Last modified January 26, 2003;
[5] Extreme Programming Explored; Wake, William; Addison Wesley ISBN 0-201-73397-8; July 2001; Chapter 5
Citation
Manjunath R and Nagashree R A, "Agile Software Development", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.40-45, 2016.
Architecture for remote intelligent data processing
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.46-50, May-2016
Abstract
In recent years, the need for data collection and Analysis is growing in many scientific disciplines. This is Consequently causing an increase of research in automated data management and data mining to create reliable methods for data analysis. To deal with the need for smart environments and big computational resources, some previous works proposed to address the problem by moving on remote processing, with the aim of sharing supercomputer resources, algorithms and costs. Following this trend, in this work we propose an architecture for advanced remote data processing in a secure, smart and versatile client–server environment that is capable of integrating pre-existing local software. In order to assess the feasibility of our proposal, we developed a case study in the context of an image-based medical diagnostic environment. Our tests demonstrated that the proposed architecture has several benefits: increase of the system throughput, easy upgradability, maintainability and scalability. Moreover, for the scenario we have considered, the system showed a very low transmission overhead which settles on about 2.5%for the widespread 10/100 mbps.
Key-Words / Index Term
JAAS,DCE-MRI ,OsiriX, secure ,NIST , biomedical ,Image processing ,TLS/SSL
References
[1] Buyya R, Yeo CS, Venugopal S (2008) Market-oriented cloud computing: vision, hype, and reality for delivering it services as computing utilities, In: 10th IEEE international conference on high performance computing and communications, 2008. HPCC2008, IEEE, New York, pp 5–13
[2]. Bryant R, Katz RH, Lazowska ED (2008) Big-data computing: creating revolutionary breakthroughs in commerce, science and society
[3]. Majithia S, Taylor I, Shields M, Wang I (2003) Triana as a graphical web services composition toolkit. In: Proceedings of the UK eScience all hands meeting, pp 2–4
[4]. Curcin V, Ghanem M (2008) Scientific workflow systems-can one size fit all? In: Cairo international biomedical engineering conference, 2008. CIBEC 2008. IEEE, New York, pp 1–9
[5]. Altintas I, Berkley C, Jaeger E, Jones M, Ludascher B, Mock S (2004) Kepler: an extensible system for design and execution of scientific workflows. In: Proceedings of the 16th international conference on scientific and statistical database management, 2004. IEEE, New York, pp 423–424
[6]. Rex DE, Ma JQ, Toga AW (2003) The loni pipeline processing environment. Neuroimage 19(3):1033–1048
[7]. Wolstencroft K, Haines R, Fellows D, Williams A, Withers D, Owen S, Soiland-Reyes S, Dunlop I, Nenadic A, Fisher P et al (2013) The taverna workflow suite: designing and executing workflows of web services on the desktop, web or in the cloud. Nucleic Acids Res gkt328
[8]. SvantessonD, ClarkeR(2010) Privacy and consumer risks in cloud computing. Comput Law Secur Rev 26(4):391–397
[9]. Scheinine AL, Donizelli M, Pescosolido M (1998) An objectoriented client–server system for interactive segmentation of medical images using the method of active contours. In: Bildverarbeitung für die Medizin 1998. Springer, New York, pp 308–312
[10]. Mayer A, Meinzer H-P (1999) High performance medical image processing in client/server-environments. Comput Methods Programs Biomed 58(3):207–217
[11]. Yacoub SM,AmmarHH(1999) The development of a client/server
Citation
Manjunath R and Shivarayappa Maranur, "Architecture for remote intelligent data processing", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.46-50, 2016.
Possible Drug Targets in Human Pathogens
Review Paper | Journal Paper
Vol.04 , Issue.03 , pp.51-53, May-2016
Abstract
When antibiotics were first introduced in the 1940’s, they were hailed as miracle drugs, and quickly provided effective therapy for many of the more dangerous pathogens then prevalent. However, resistance to these antimicrobials developed quickly. The World Health Organisation report into antimicrobial resistance published online, notes that formerly curable bacterial diseases are on the increase. For example, 98% of all South-East Asian gonorrhoea cases are presently multi-drug resistant, while up to 60% of nosocomial infections in the developed world are caused by drug-resistant and often opportunistic pathogens. Infections with rare virulent micro-organisms like Acinetobacter are also on the increase and opportunistic bacterial infections such as Pseudomonas aeruginosa and Salmonella spp. are becoming more common. Several factors contributing to this phenomenon during five decades of antibiotic mishandling have included: health workers misdiagnosing illness or providing the wrong prescription, patients failing to adhere to treatment, and the misuse of antimicrobials in animals with secondary effects observed in humans. To help counteract these problems, advances in technology can be used to hasten the hunt for new drug and vaccine targets. Bioinformatics itself can be defined as utilising large databases of biological information with specific in silico tools to complement traditional wet laboratory-based biology.
Key-Words / Index Term
Genomes, Putative Target Database, endonuclease fragments,Perl and Bioperl.
References
[1] Kishore R. Sakharkar, Meena K. Sakharkar and Vincent T. K. Chow, “A novel genomics approach for the identification of drug targets in pathogens, with special reference to Pseudomonas aeruginosa”
[2] Chan-Eng Chong, Boon-San Lim, Sheila Nathan and Rahmah Mohamed, “In silico analysis of Burkholderia pseudomallei genome sequence for potential drug targets”
[3] Anirban Dutta, Shashi Kr. Singh, Payel Ghosh, Runni Mukherjee, Sayak Mitter and Debashis Bandyopadhyay, “In silico identification of potential therapeutic targets in the human pathogen Helicobacter pylori”
[4] Bhawna Rathi, Aditya N. Sarangi, Nidhi Trivedi, “Genome subtraction for novel target definition in Salmonella typhi”
[5] Gupta Sunil Kumar, Singh Sarita, Gupta Manish Kumar, Pant KK and Seth PK, “Definition of Potential Targets in Mycoplasma pneumoniae Through Subtractive Genome Analysis”
[6] Ren Zhang, Hong-Yu Ou and Chun-Ting Zhang, “DEG: a database of essential genes”.
[7]Debmalya Barh, Anil Kumar, Amarendra Narayana Misra, “Genomic Target Database (GTD): A database of potential targets in human pathogenic bacteria”
Citation
Vishwanatha, K S Jagadeesh Muralidhara B K Siddaramappa, "Possible Drug Targets in Human Pathogens", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.51-53, 2016.